401trg / utilities
This repository contains tools used by 401trg.
☆20Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for utilities
- Some rules, scripts of some use to us☆9Updated 2 weeks ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Old home of LimaCharlie, open source EDR☆28Updated last year
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- Virustotal Data to Timesketch☆17Updated 5 years ago
- ☆12Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Home to the ActorTrackr source code☆27Updated 7 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Bro integration with osquery☆15Updated last year
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- ☆12Updated 5 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- ☆22Updated 6 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- Detect Phishing with Bro IDS☆18Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago